RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Similar documents
Ethernet. Introduction. CSE 3213 Fall 2011

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications

COS 140: Foundations of Computer Science

Local Area Network Overview

ET4254 Communications and Networking 1

COS 140: Foundations of Computer Science

Local Area Networks (LANs) SMU CSE 5344 /

Lecture 05 Chapter 16 High Speed LANs

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 15 Local Area Network Overview

CARRIER SENSE MULTIPLE ACCESS (CSMA):

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Contention Protocols and Networks

Data Link Layer -2- Network Access

Chapter 11 in Stallings 10 th Edition

EE 122: Ethernet and

Data Link Layer -2- Network Access

Data Link Layer, Part 5. Medium Access Control

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

LAN PROTOCOLS. Beulah A AP/CSE

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Redes de Computadores. Medium Access Control

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Outline: Connecting Many Computers

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Data Link Layer, Part 3 Medium Access Control. Preface

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Introduction to LAN Protocols

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Networks Homework # 2

ECE 158A: Lecture 13. Fall 2015

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Internet Architecture and Protocol

Link Layer and Ethernet

ก ก Information Technology II

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Multiple Access Protocols

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Summary of MAC protocols

Introduction to LAN Protocols

LAN Overview (part 2) Interconnecting LANs - Hubs

Medium Access Control Sublayer

Link Layer and Ethernet

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Networking Technologies and Applications

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Media Access Control (MAC) Sub-layer and Ethernet

CS343: Data Communication LAN Overview

CSMA/CD (Collision Detection)

Computer Networks Principles LAN - Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

COMPUTER NETWORKS - Local area networks

More on LANS. LAN Wiring, Interface

Local area networks. Copyright

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CSE 461: Multiple Access Networks. This Lecture

Chapter 5: Link layer

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Medium Access Protocols

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Module 16: Distributed System Structures

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

CS 455/555 Intro to Networks and Communications. Link Layer

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Ethernet. Networks: Ethernet 1

Data Link Layer: Collisions

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The Link Layer and LANs. Chapter 6: Link layer and LANs

Protocols for Multiaccess Networks

Chapter 12 Multiple Access 12.1

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data Link Layer: Multi Access Protocols

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Lecture 6: Example LAN: Ethernet

The Internet software layers

Chapter 5 Link Layer and LANs

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Lecture 8: Switched Ethernet and Collision Domains

Chapter 6 Connecting Device

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Multiple Access Links and Protocols

CH : 15 LOCAL AREA NETWORK OVERVIEW

Transcription:

RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1

Lecture Overview During this lecture, we will Look at several Multiple Access Control methods Introduce ALOHA Introduce CSMA CSMA/CD Network components Recommended reading Chapter 15, 16 (Stallings, 8 th Ed.) Technology Slide 2

Ethernet (CSMA/CD) Carriers Sense Multiple Access with Collision Detection Xerox - Ethernet IEEE 802.3 MAC Random Access Stations access medium randomly Contention Stations content for time on medium Technology Slide 3

Evolution of random-access methods Technology Slide 4

ALOHA Network Packet Radio When station has frame, it sends Station listens (for max round trip time) plus small increment If ACK, ok else retransmit If no ACK after repeated transmissions, gives up Frame damaged by noise or by another station transmitting at the same time (collision) Overlap of frames causes collision Max utilization about 18% Technology Slide 5

ALOHA Protocol Technology Slide 6

What is this backoff? Any station can send a frame If there is a collision, the frame needs to be sent again. To reduce the probability of collision the second time, the station waits it backs off How much to wait? First time a little, more if a collision occurs again, and so on. Technology Slide 7

Slotted ALOHA Time on channel divided into uniform slots Size of slots equal the frame transmission time Need central clock (or other sync mechanism) to synchronize all stations Transmission permitted to begin only at a slot boundary Frames either miss or overlap totally Max utilization about 37% Point to note ALOHA and Slotted ALOHA poor utilization Technology Slide 8

CSMA listen before talk Why CSMA: to minimize the chance of collision (in ALOHA) increase performance. All stations know that a transmission has started almost immediately First listen for clear medium (carrier sense) If medium idle, transmit If two stations start at the same instant, collision. Wait reasonable time (round trip plus ACK) No ACK then retransmit Max utilization depends on propagation time (medium length) and frame length Longer frame and shorter propagation gives better utilization Technology Slide 9

Collision in CSMA Technology Slide 10

Persistence Strategies Technology Slide 11

Nonpersistent CSMA Algorithm that specifies what station should do when medium is found busy IEEE 802.3 p-persistent technique The rules 1. If medium idle, transmit; else next step 2. Medium busy, wait! Repeat step 1 Random delays reduces probability of collisions Two stations ready to transmit at same time when transmission in progress If both stations delay same time before retrying, both will attempt to transmit at same time Capacity is wasted because medium will remain idle following end of transmission Even if one or more stations waiting Technology Slide 12

Value of p Objective: Avoid instability under heavy load If large number of stations waiting to send -Repeated attempts to transmit - more collisions Retries compete with new transmissions Eventually, all stations trying to send Continuous collisions; zero throughput If heavy load expected, p small However, as p made smaller, stations wait longer At low loads, this gives very long delays Technology Slide 13

CSMA/CD With CSMA, collision occupies medium for duration of transmission Stations listen whilst transmitting 1. If medium idle, transmit, else step 2 2. If busy, listen for idle, then transmit 3. If collision detected, jam then cease transmission 4. After jam, wait random time then start from step 1 Technology Slide 14

CSMA/CD Procedure Technology Slide 15

IEEE 802 v OSI and PL functions Architecture developed by IEEE 802 committee (IEEE 802 reference model) Physical Layer (PL) functions Encoding/decoding of signals Preamble removal/generation Bit transmission/reception Above PL functions associated with providing service to users Transmission assemble data Reception disassemble frame Govern access and provide interface Technology Slide 16

LAN Protocols in Context Technology Slide 17

LAN Topology LAN topology based on application and environment. Bus topology Tree topology Ring topology Star topology Technology Slide 18

Full Duplex Operation Traditional (old) Ethernet half duplex Either transmit or receive but not both simultaneously With full-duplex, station can transmit and receive simultaneously 100-Mbps Ethernet in full-duplex mode, theoretical transfer rate 200 Mbps Attached stations must have full-duplex adapter cards Technology Slide 19

Heard by all stations Bus and Tree topology Need to identify target station Each station has unique address Full duplex connection - station and tap Tap allows connection to cable Tree is an extension of Bus topology Technology Slide 20

Node to node in closed loop Unidirectional Circulate past all stations Node acts as repeater for other nodes messages Media access control Ensures that each station has a chance to insert their own data Will not just pass only other nodes messages Ring Topology Technology Slide 21

Connecting Devices Repeaters Hubs Bridges Two-Layer Switches Technology Slide 22

Repeaters A repeater connects segments of a LAN A repeater forwards every frame; it has no filtering capability Technology Slide 23

Function of a repeater A repeater is a regenerator, not an amplifier Technology Slide 24

Hubs Active central element of star layout Each station connected to hub by two lines Transmit and receive Hub acts as a repeater When single station transmits, hub repeats signal on outgoing line to each station Line consists of two unshielded twisted pairs Limited to about 100 m High data rate and poor transmission qualities of UTP Optical fiber may be used Max about 500 m Physically star, logically bus Transmission from any station received by all other stations If two stations transmit at the same time, collision Technology Slide 25

Bridges Ability to expand beyond single LAN Provide interconnection to other LANs/WANs Use Bridge or router Bridge is simpler Connects similar LANs Identical protocols for physical and link layers Minimal processing Bridge has filtering capabilities Router more general purpose Interconnect various LANs and WANs Technology Slide 26

Bridge Operation If frame for 712b13456142 arrives at port 1 the bridge consults table for departing port. So, it leaves through port 1 Therefore no need for forwarding, the frame is dropped. Result: LAN2 remains free of traffic. If frame for 712b13456141 arrives at port 2, the frame is forwarded. Result: Both LANs have traffic. Technology Slide 27

Bridge Operation Read all frames transmitted on one LAN and accept those address to any station on the other LAN Using MAC protocol for second LAN, retransmit each frame Do the same the other way round No modification to content or format of frame Enough buffer space to meet demands Technology Slide 28

Why Bridge? Reliability Partitioned into self-contained units Performance Decreases with increase in number of devices Security Improves security of communications Different traffic needing different security Different users different security level Geography Devices clustered in different locations Technology Slide 29

Bandwidth Sharing In an unbridged ethernet network, the total capacity (say 10 Mbps) is shared by all the stations. If two stations are sending frames, the probably alternate usage. On av. each station sends at the rate of 5 Mbps. If all stations sending, eff rate -> 10/12 Mbps. With bridging: 12 stations divided into two networks, each with 6.Under heavy load each station is theoretically offered 10/6 Mbps, not 10/12 Mbps. Technology Slide 30

Collision domains in a nonbridged and bridged network Technology Slide 31

Switched Ethernet Technology Slide 32

Layer 2 and 4 Switches Layer 2 switches operate using physical network addresses Switches operating at Layer 2 are very fast because they re just sorting physical addresses Are not very smart that is, they don t look at the data packet very closely Layer 4 switches can use transport layer protocols to differentiate types of applications Use policies to direct traffic to different locations for load balancing. Technology Slide 33

Typical Large LAN Organization Diagram Technology Slide 34

Cluster based LAN Architecture Cluster Based Web System in LAN the server nodes mask their IP addresses to clients, using a Virtual IP address corresponding to one device (web switch) in front of the set of the servers Web switch receives all packets and then sends them to server nodes Technology Slide 35

Cluster based architecture Taxonomy Technology Slide 36

Basic router filtering in LAN Prevent spoofing drop packets that have source address different from the assigned range 192.168.2.0/24 Internet ip access-list 150 permit 192.168.2.0 255.255.255.0 any Technology Slide 37

Basic router filtering Guard against IP address trust exploits drop packets with your network s source address coming from internet 192.168.2.0/24 Internet ip access-list 160 deny 192.168.2.0 255.255.255.0 any Technology Slide 38

Basic router filtering Don t help flooders prevent your network being used as a DoS amplifier 192.168.2.0/24 Internet no ip directed broadcast Technology Slide 39

Division of the network public segment DNS server public web server mail server (MX record points to it) private segment internal web server SMB/NetBIOS shares mail server (retrieves mail from the mail server on the public segment) Technology Slide 40

Filtering traffic (1) public web server email server DNS server private internal web server email server NetBIOS shared disks and printers Technology Slide 41

Filtering traffic (2) public web server email server DNS server permit tcp/80 permit tcp/25 permit udp/53 private internal web server email server NetBIOS shared disks and printers Technology Slide 42

Filtering traffic (3) public web server email server DNS server permit tcp established private internal web server email server NetBIOS shared disks and printers Technology Slide 43

Filtering traffic (4) public web server email server DNS server permit any private internal web server email server NetBIOS shared disks and printers Technology Slide 44

Filtering traffic public web server email server DNS server permit tcp/25 permit udp/53 private permit tcp established internal web server email server NetBIOS shared disks and printers Technology Slide 45

Firewalls wide range of products features packet filtering stateful inspection application proxies active content filtering and anti-virus protection VPN integration Technology Slide 46

firewall Implement a firewall your network public private Internet still allows transmission of information from private area into the Internet! Technology Slide 47

Summary In this lecture, we have understood: Multiple Access Control methods ALOHA, CSMA, CSMA/CD Ethernet, LAN topologies, Bridge Basic Network security in LAN Technology Slide 48

Next Time We will know about 802.11 Wireless LAN Bluetooth Cellular Communications Satellite Networks Suggested Reading: Chapters 14 and 17 (Stallings) Technology Slide 49